Index/Organizations/Internet Society

Internet Society

Internet development organization

Fact-Checks

12 results
Dec 21, 2025
Most Viewed

Is the UK really looking into backdooring phones or using glorified government backed spyware?

Yes — UK authorities and some lawmakers have been actively pursuing legal and technical routes that could force companies to give state access to encrypted data and that proponents describe as on-devi...

Nov 20, 2025
Most Viewed

What are the legal and privacy limits for tracing IP addresses and devices in CSAM investigations?

Legal and technical limits on tracing IPs and devices in CSAM investigations balance powerful investigative tools against privacy and encryption protections: U.S. law requires providers to report “app...

Oct 6, 2025
Most Viewed

Can internet service providers be held liable for users downloading pirated content?

Internet service providers (ISPs) face a contested and evolving legal landscape about liability for users who download pirated content: courts and advocates in 2025 show a strong pushback against broa...

Dec 7, 2025

What metadata from messaging apps and end-to-end encrypted services can implicate CSAM access?

Metadata—timestamps, filenames, file sizes, geotags, device identifiers, IP addresses and delivery logs—can point investigators to who accessed or shared CSAM even when message content is end-to-end e...

Nov 30, 2025

What U.S. federal statutes and Supreme Court precedents apply to law enforcement-run CSAM honeypots?

Law enforcement-run honeypots implicated in CSAM investigations sit at the intersection of several federal statutes (notably the PROTECT Act reporting duties to NCMEC, federal CSAM criminal statutes, ...

Nov 26, 2025

Are there defenses against CSAM charges based on automatic caching?

Automatic caching or background cloud backups can leave users with copies of images they did not intend to keep, and defense arguments have arisen around lack of knowledge or automatic processes rathe...

Nov 26, 2025

Can internet service providers legally monitor and log my visits to websites considered illegal in 2025?

ISPs can and do monitor and log user connections and may be required by law or court order to record or act on visits to websites deemed illegal; methods include DNS/IP blocking and deeper inspection,...

Jan 7, 2026

What exactly did the UK Technical Capability Notice to Apple demand and what legal challenges has it faced?

The UK Technical Capability Notice (TCN) issued to Apple under the Investigatory Powers Act demanded that Apple maintain the capability to provide access to data stored in its iCloud Advanced Data Pro...

Jan 6, 2026

How does end‑to‑end encryption affect the ability of platforms to detect and report CSAM?

End‑to‑end encryption (E2EE) substantially reduces platforms’ technical ability to scan message content for known child sexual abuse material (CSAM), meaning traditional server‑side hashing and AI det...

Dec 5, 2025

What safeguards exist to prevent misuse of seized datasets and to protect privacy of uninvolved parties in large-scale CSAM operations?

Lawmakers, regulators and platforms rely on a mix of legal limits, technical controls and process rules to try to prevent misuse of seized CSAM datasets and to protect uninvolved people — most promine...

Nov 28, 2025

Brazil's Internet Civil Mark recent changes

Brazil’s 2014 Marco Civil da Internet established safe-harbors: intermediaries are generally liable for third‑party content only after a specific court order (Article 19) . In mid‑2025 the Supreme Fed...

Nov 19, 2025

How do evolving privacy laws and encryption affect the availability of metadata and device forensics in CSAM cases in 2025?

Evolving privacy and encryption debates in 2025 are tightening the trade‑offs between law enforcement access to metadata/device forensics and civil‑liberties protections: U.S. bills like the STOP CSAM...